123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318 |
- // Copyright 2015 Google LLC. All Rights Reserved.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package ct
- import (
- "crypto"
- "crypto/sha256"
- "fmt"
- "time"
- "github.com/google/certificate-transparency-go/tls"
- "github.com/google/certificate-transparency-go/x509"
- )
- // SerializeSCTSignatureInput serializes the passed in sct and log entry into
- // the correct format for signing.
- func SerializeSCTSignatureInput(sct SignedCertificateTimestamp, entry LogEntry) ([]byte, error) {
- switch sct.SCTVersion {
- case V1:
- input := CertificateTimestamp{
- SCTVersion: sct.SCTVersion,
- SignatureType: CertificateTimestampSignatureType,
- Timestamp: sct.Timestamp,
- EntryType: entry.Leaf.TimestampedEntry.EntryType,
- Extensions: sct.Extensions,
- }
- switch entry.Leaf.TimestampedEntry.EntryType {
- case X509LogEntryType:
- input.X509Entry = entry.Leaf.TimestampedEntry.X509Entry
- case PrecertLogEntryType:
- input.PrecertEntry = &PreCert{
- IssuerKeyHash: entry.Leaf.TimestampedEntry.PrecertEntry.IssuerKeyHash,
- TBSCertificate: entry.Leaf.TimestampedEntry.PrecertEntry.TBSCertificate,
- }
- default:
- return nil, fmt.Errorf("unsupported entry type %s", entry.Leaf.TimestampedEntry.EntryType)
- }
- return tls.Marshal(input)
- default:
- return nil, fmt.Errorf("unknown SCT version %d", sct.SCTVersion)
- }
- }
- // SerializeSTHSignatureInput serializes the passed in STH into the correct
- // format for signing.
- func SerializeSTHSignatureInput(sth SignedTreeHead) ([]byte, error) {
- switch sth.Version {
- case V1:
- if len(sth.SHA256RootHash) != crypto.SHA256.Size() {
- return nil, fmt.Errorf("invalid TreeHash length, got %d expected %d", len(sth.SHA256RootHash), crypto.SHA256.Size())
- }
- input := TreeHeadSignature{
- Version: sth.Version,
- SignatureType: TreeHashSignatureType,
- Timestamp: sth.Timestamp,
- TreeSize: sth.TreeSize,
- SHA256RootHash: sth.SHA256RootHash,
- }
- return tls.Marshal(input)
- default:
- return nil, fmt.Errorf("unsupported STH version %d", sth.Version)
- }
- }
- // CreateX509MerkleTreeLeaf generates a MerkleTreeLeaf for an X509 cert
- func CreateX509MerkleTreeLeaf(cert ASN1Cert, timestamp uint64) *MerkleTreeLeaf {
- return &MerkleTreeLeaf{
- Version: V1,
- LeafType: TimestampedEntryLeafType,
- TimestampedEntry: &TimestampedEntry{
- Timestamp: timestamp,
- EntryType: X509LogEntryType,
- X509Entry: &cert,
- },
- }
- }
- // MerkleTreeLeafFromRawChain generates a MerkleTreeLeaf from a chain (in DER-encoded form) and timestamp.
- func MerkleTreeLeafFromRawChain(rawChain []ASN1Cert, etype LogEntryType, timestamp uint64) (*MerkleTreeLeaf, error) {
- // Need at most 3 of the chain
- count := 3
- if count > len(rawChain) {
- count = len(rawChain)
- }
- chain := make([]*x509.Certificate, count)
- for i := range chain {
- cert, err := x509.ParseCertificate(rawChain[i].Data)
- if x509.IsFatal(err) {
- return nil, fmt.Errorf("failed to parse chain[%d] cert: %v", i, err)
- }
- chain[i] = cert
- }
- return MerkleTreeLeafFromChain(chain, etype, timestamp)
- }
- // MerkleTreeLeafFromChain generates a MerkleTreeLeaf from a chain and timestamp.
- func MerkleTreeLeafFromChain(chain []*x509.Certificate, etype LogEntryType, timestamp uint64) (*MerkleTreeLeaf, error) {
- leaf := MerkleTreeLeaf{
- Version: V1,
- LeafType: TimestampedEntryLeafType,
- TimestampedEntry: &TimestampedEntry{
- EntryType: etype,
- Timestamp: timestamp,
- },
- }
- if etype == X509LogEntryType {
- leaf.TimestampedEntry.X509Entry = &ASN1Cert{Data: chain[0].Raw}
- return &leaf, nil
- }
- if etype != PrecertLogEntryType {
- return nil, fmt.Errorf("unknown LogEntryType %d", etype)
- }
- // Pre-certs are more complicated. First, parse the leaf pre-cert and its
- // putative issuer.
- if len(chain) < 2 {
- return nil, fmt.Errorf("no issuer cert available for precert leaf building")
- }
- issuer := chain[1]
- cert := chain[0]
- var preIssuer *x509.Certificate
- if IsPreIssuer(issuer) {
- // Replace the cert's issuance information with details from the pre-issuer.
- preIssuer = issuer
- // The issuer of the pre-cert is not going to be the issuer of the final
- // cert. Change to use the final issuer's key hash.
- if len(chain) < 3 {
- return nil, fmt.Errorf("no issuer cert available for pre-issuer")
- }
- issuer = chain[2]
- }
- // Next, post-process the DER-encoded TBSCertificate, to remove the CT poison
- // extension and possibly update the issuer field.
- defangedTBS, err := x509.BuildPrecertTBS(cert.RawTBSCertificate, preIssuer)
- if err != nil {
- return nil, fmt.Errorf("failed to remove poison extension: %v", err)
- }
- leaf.TimestampedEntry.EntryType = PrecertLogEntryType
- leaf.TimestampedEntry.PrecertEntry = &PreCert{
- IssuerKeyHash: sha256.Sum256(issuer.RawSubjectPublicKeyInfo),
- TBSCertificate: defangedTBS,
- }
- return &leaf, nil
- }
- // MerkleTreeLeafForEmbeddedSCT generates a MerkleTreeLeaf from a chain and an
- // SCT timestamp, where the leaf certificate at chain[0] is a certificate that
- // contains embedded SCTs. It is assumed that the timestamp provided is from
- // one of the SCTs embedded within the leaf certificate.
- func MerkleTreeLeafForEmbeddedSCT(chain []*x509.Certificate, timestamp uint64) (*MerkleTreeLeaf, error) {
- // For building the leaf for a certificate and SCT where the SCT is embedded
- // in the certificate, we need to build the original precertificate TBS
- // data. First, parse the leaf cert and its issuer.
- if len(chain) < 2 {
- return nil, fmt.Errorf("no issuer cert available for precert leaf building")
- }
- issuer := chain[1]
- cert := chain[0]
- // Next, post-process the DER-encoded TBSCertificate, to remove the SCTList
- // extension.
- tbs, err := x509.RemoveSCTList(cert.RawTBSCertificate)
- if err != nil {
- return nil, fmt.Errorf("failed to remove SCT List extension: %v", err)
- }
- return &MerkleTreeLeaf{
- Version: V1,
- LeafType: TimestampedEntryLeafType,
- TimestampedEntry: &TimestampedEntry{
- EntryType: PrecertLogEntryType,
- Timestamp: timestamp,
- PrecertEntry: &PreCert{
- IssuerKeyHash: sha256.Sum256(issuer.RawSubjectPublicKeyInfo),
- TBSCertificate: tbs,
- },
- },
- }, nil
- }
- // LeafHashForLeaf returns the leaf hash for a Merkle tree leaf.
- func LeafHashForLeaf(leaf *MerkleTreeLeaf) ([sha256.Size]byte, error) {
- leafData, err := tls.Marshal(*leaf)
- if err != nil {
- return [sha256.Size]byte{}, fmt.Errorf("failed to tls-encode MerkleTreeLeaf: %s", err)
- }
- data := append([]byte{TreeLeafPrefix}, leafData...)
- leafHash := sha256.Sum256(data)
- return leafHash, nil
- }
- // IsPreIssuer indicates whether a certificate is a pre-cert issuer with the specific
- // certificate transparency extended key usage.
- func IsPreIssuer(issuer *x509.Certificate) bool {
- for _, eku := range issuer.ExtKeyUsage {
- if eku == x509.ExtKeyUsageCertificateTransparency {
- return true
- }
- }
- return false
- }
- // RawLogEntryFromLeaf converts a LeafEntry object (which has the raw leaf data
- // after JSON parsing) into a RawLogEntry object (i.e. a TLS-parsed structure).
- func RawLogEntryFromLeaf(index int64, entry *LeafEntry) (*RawLogEntry, error) {
- ret := RawLogEntry{Index: index}
- if rest, err := tls.Unmarshal(entry.LeafInput, &ret.Leaf); err != nil {
- return nil, fmt.Errorf("failed to unmarshal MerkleTreeLeaf: %v", err)
- } else if len(rest) > 0 {
- return nil, fmt.Errorf("MerkleTreeLeaf: trailing data %d bytes", len(rest))
- }
- switch eType := ret.Leaf.TimestampedEntry.EntryType; eType {
- case X509LogEntryType:
- var certChain CertificateChain
- if rest, err := tls.Unmarshal(entry.ExtraData, &certChain); err != nil {
- return nil, fmt.Errorf("failed to unmarshal CertificateChain: %v", err)
- } else if len(rest) > 0 {
- return nil, fmt.Errorf("CertificateChain: trailing data %d bytes", len(rest))
- }
- ret.Cert = *ret.Leaf.TimestampedEntry.X509Entry
- ret.Chain = certChain.Entries
- case PrecertLogEntryType:
- var precertChain PrecertChainEntry
- if rest, err := tls.Unmarshal(entry.ExtraData, &precertChain); err != nil {
- return nil, fmt.Errorf("failed to unmarshal PrecertChainEntry: %v", err)
- } else if len(rest) > 0 {
- return nil, fmt.Errorf("PrecertChainEntry: trailing data %d bytes", len(rest))
- }
- ret.Cert = precertChain.PreCertificate
- ret.Chain = precertChain.CertificateChain
- default:
- // TODO(pavelkalinnikov): Section 4.6 of RFC6962 implies that unknown types
- // are not errors. We should revisit how we process this case.
- return nil, fmt.Errorf("unknown entry type: %v", eType)
- }
- return &ret, nil
- }
- // ToLogEntry converts RawLogEntry to a LogEntry, which includes an x509-parsed
- // (pre-)certificate.
- //
- // Note that this function may return a valid LogEntry object and a non-nil
- // error value, when the error indicates a non-fatal parsing error.
- func (rle *RawLogEntry) ToLogEntry() (*LogEntry, error) {
- var err error
- entry := LogEntry{Index: rle.Index, Leaf: rle.Leaf, Chain: rle.Chain}
- switch eType := rle.Leaf.TimestampedEntry.EntryType; eType {
- case X509LogEntryType:
- entry.X509Cert, err = rle.Leaf.X509Certificate()
- if x509.IsFatal(err) {
- return nil, fmt.Errorf("failed to parse certificate: %v", err)
- }
- case PrecertLogEntryType:
- var tbsCert *x509.Certificate
- tbsCert, err = rle.Leaf.Precertificate()
- if x509.IsFatal(err) {
- return nil, fmt.Errorf("failed to parse precertificate: %v", err)
- }
- entry.Precert = &Precertificate{
- Submitted: rle.Cert,
- IssuerKeyHash: rle.Leaf.TimestampedEntry.PrecertEntry.IssuerKeyHash,
- TBSCertificate: tbsCert,
- }
- default:
- return nil, fmt.Errorf("unknown entry type: %v", eType)
- }
- // err may be non-nil for a non-fatal error.
- return &entry, err
- }
- // LogEntryFromLeaf converts a LeafEntry object (which has the raw leaf data
- // after JSON parsing) into a LogEntry object (which includes x509.Certificate
- // objects, after TLS and ASN.1 parsing).
- //
- // Note that this function may return a valid LogEntry object and a non-nil
- // error value, when the error indicates a non-fatal parsing error.
- func LogEntryFromLeaf(index int64, leaf *LeafEntry) (*LogEntry, error) {
- rle, err := RawLogEntryFromLeaf(index, leaf)
- if err != nil {
- return nil, err
- }
- return rle.ToLogEntry()
- }
- // TimestampToTime converts a timestamp in the style of RFC 6962 (milliseconds
- // since UNIX epoch) to a Go Time.
- func TimestampToTime(ts uint64) time.Time {
- secs := int64(ts / 1000)
- msecs := int64(ts % 1000)
- return time.Unix(secs, msecs*1000000)
- }
|